Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
9127be998e556e17363396d1526611b4
-
SHA1
1183f9970e1774d3e157d70225c3b7f3c92d9699
-
SHA256
b852e881c1897d85e3ba7b89065c7ed027bcd775ec34e465b870fd5b2640b1ec
-
SHA512
20c571bfdcb0a0b844a2266e7cdcbc5b3e13b319ad22c8ef5cf9c4930c2caac6dd12cb027324d75161d2af90b88da3b4dc09eb13a1ec2392e343df0f7ac8fd4a
-
SSDEEP
24576:xLJoznnpt2joFJa/TDaJ9wI5yo62W4DmDPLoaRbuDTWzmZMSiEzhV4vk3NVPbY8X:xLJwnnpAjcwpoIPsaR4TWoZdd9bs
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 795613f5ee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 795613f5ee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 795613f5ee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 795613f5ee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 795613f5ee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 795613f5ee.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF e0d67ba1a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 6cef4e3b54.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6cef4e3b54.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9464fff3b4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5a589d757b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 795613f5ee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e0d67ba1a8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9139a13e73.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e0d67ba1a8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9139a13e73.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9139a13e73.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6cef4e3b54.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9464fff3b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5a589d757b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e0d67ba1a8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6cef4e3b54.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9464fff3b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5a589d757b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 795613f5ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 795613f5ee.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation SKOblik.exe -
Executes dropped EXE 13 IoCs
pid Process 640 skotes.exe 4512 SKOblik.exe 1292 e0d67ba1a8.exe 4644 9139a13e73.exe 972 6cef4e3b54.exe 4780 9464fff3b4.exe 2224 5a589d757b.exe 3848 skotes.exe 5000 a25acc169a.exe 1656 795613f5ee.exe 4784 PureSync.exe 6056 PureSync.exe 2136 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 9139a13e73.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 6cef4e3b54.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 9464fff3b4.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 5a589d757b.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 795613f5ee.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine e0d67ba1a8.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe -
Loads dropped DLL 12 IoCs
pid Process 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 795613f5ee.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 795613f5ee.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9464fff3b4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010245001\\9464fff3b4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5a589d757b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010246001\\5a589d757b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a25acc169a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010247001\\a25acc169a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\795613f5ee.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010248001\\795613f5ee.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cdc-150.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3644 file.exe 640 skotes.exe 1292 e0d67ba1a8.exe 4644 9139a13e73.exe 972 6cef4e3b54.exe 4780 9464fff3b4.exe 2224 5a589d757b.exe 3848 skotes.exe 1656 795613f5ee.exe 2136 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x0007000000023cad-30.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2856 4644 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PureSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PureSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6cef4e3b54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a589d757b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SKOblik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a25acc169a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9464fff3b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 795613f5ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0d67ba1a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9139a13e73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 24 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier PureSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information PureSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString PureSync.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 PureSync.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor PureSync.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 PureSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet PureSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision PureSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data PureSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier PureSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 PureSync.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 PureSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier PureSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz PureSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data PureSync.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor PureSync.exe -
Kills process with taskkill 5 IoCs
pid Process 4900 taskkill.exe 1788 taskkill.exe 400 taskkill.exe 1160 taskkill.exe 3180 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 3644 file.exe 3644 file.exe 640 skotes.exe 640 skotes.exe 1292 e0d67ba1a8.exe 1292 e0d67ba1a8.exe 1292 e0d67ba1a8.exe 1292 e0d67ba1a8.exe 1292 e0d67ba1a8.exe 1292 e0d67ba1a8.exe 1292 e0d67ba1a8.exe 1292 e0d67ba1a8.exe 1292 e0d67ba1a8.exe 1292 e0d67ba1a8.exe 4644 9139a13e73.exe 4644 9139a13e73.exe 972 6cef4e3b54.exe 972 6cef4e3b54.exe 972 6cef4e3b54.exe 972 6cef4e3b54.exe 972 6cef4e3b54.exe 972 6cef4e3b54.exe 972 6cef4e3b54.exe 972 6cef4e3b54.exe 972 6cef4e3b54.exe 972 6cef4e3b54.exe 4780 9464fff3b4.exe 4780 9464fff3b4.exe 2224 5a589d757b.exe 2224 5a589d757b.exe 3848 skotes.exe 3848 skotes.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 1656 795613f5ee.exe 1656 795613f5ee.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 1656 795613f5ee.exe 1656 795613f5ee.exe 1656 795613f5ee.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe 2136 skotes.exe 2136 skotes.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3180 taskkill.exe Token: SeDebugPrivilege 4900 taskkill.exe Token: SeDebugPrivilege 1788 taskkill.exe Token: SeDebugPrivilege 400 taskkill.exe Token: SeDebugPrivilege 1160 taskkill.exe Token: SeDebugPrivilege 3416 firefox.exe Token: SeDebugPrivilege 3416 firefox.exe Token: SeDebugPrivilege 1656 795613f5ee.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3644 file.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 5000 a25acc169a.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 5000 a25acc169a.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 3416 firefox.exe 5000 a25acc169a.exe 5000 a25acc169a.exe 5000 a25acc169a.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3416 firefox.exe 4784 PureSync.exe 6056 PureSync.exe 6056 PureSync.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3644 wrote to memory of 640 3644 file.exe 82 PID 3644 wrote to memory of 640 3644 file.exe 82 PID 3644 wrote to memory of 640 3644 file.exe 82 PID 640 wrote to memory of 4512 640 skotes.exe 90 PID 640 wrote to memory of 4512 640 skotes.exe 90 PID 640 wrote to memory of 4512 640 skotes.exe 90 PID 640 wrote to memory of 1292 640 skotes.exe 93 PID 640 wrote to memory of 1292 640 skotes.exe 93 PID 640 wrote to memory of 1292 640 skotes.exe 93 PID 640 wrote to memory of 4644 640 skotes.exe 94 PID 640 wrote to memory of 4644 640 skotes.exe 94 PID 640 wrote to memory of 4644 640 skotes.exe 94 PID 640 wrote to memory of 972 640 skotes.exe 95 PID 640 wrote to memory of 972 640 skotes.exe 95 PID 640 wrote to memory of 972 640 skotes.exe 95 PID 640 wrote to memory of 4780 640 skotes.exe 96 PID 640 wrote to memory of 4780 640 skotes.exe 96 PID 640 wrote to memory of 4780 640 skotes.exe 96 PID 640 wrote to memory of 2224 640 skotes.exe 97 PID 640 wrote to memory of 2224 640 skotes.exe 97 PID 640 wrote to memory of 2224 640 skotes.exe 97 PID 640 wrote to memory of 5000 640 skotes.exe 99 PID 640 wrote to memory of 5000 640 skotes.exe 99 PID 640 wrote to memory of 5000 640 skotes.exe 99 PID 5000 wrote to memory of 3180 5000 a25acc169a.exe 100 PID 5000 wrote to memory of 3180 5000 a25acc169a.exe 100 PID 5000 wrote to memory of 3180 5000 a25acc169a.exe 100 PID 5000 wrote to memory of 4900 5000 a25acc169a.exe 102 PID 5000 wrote to memory of 4900 5000 a25acc169a.exe 102 PID 5000 wrote to memory of 4900 5000 a25acc169a.exe 102 PID 5000 wrote to memory of 1788 5000 a25acc169a.exe 104 PID 5000 wrote to memory of 1788 5000 a25acc169a.exe 104 PID 5000 wrote to memory of 1788 5000 a25acc169a.exe 104 PID 5000 wrote to memory of 400 5000 a25acc169a.exe 106 PID 5000 wrote to memory of 400 5000 a25acc169a.exe 106 PID 5000 wrote to memory of 400 5000 a25acc169a.exe 106 PID 5000 wrote to memory of 1160 5000 a25acc169a.exe 108 PID 5000 wrote to memory of 1160 5000 a25acc169a.exe 108 PID 5000 wrote to memory of 1160 5000 a25acc169a.exe 108 PID 5000 wrote to memory of 3204 5000 a25acc169a.exe 110 PID 5000 wrote to memory of 3204 5000 a25acc169a.exe 110 PID 3204 wrote to memory of 3416 3204 firefox.exe 111 PID 3204 wrote to memory of 3416 3204 firefox.exe 111 PID 3204 wrote to memory of 3416 3204 firefox.exe 111 PID 3204 wrote to memory of 3416 3204 firefox.exe 111 PID 3204 wrote to memory of 3416 3204 firefox.exe 111 PID 3204 wrote to memory of 3416 3204 firefox.exe 111 PID 3204 wrote to memory of 3416 3204 firefox.exe 111 PID 3204 wrote to memory of 3416 3204 firefox.exe 111 PID 3204 wrote to memory of 3416 3204 firefox.exe 111 PID 3204 wrote to memory of 3416 3204 firefox.exe 111 PID 3204 wrote to memory of 3416 3204 firefox.exe 111 PID 3416 wrote to memory of 1272 3416 firefox.exe 112 PID 3416 wrote to memory of 1272 3416 firefox.exe 112 PID 3416 wrote to memory of 1272 3416 firefox.exe 112 PID 3416 wrote to memory of 1272 3416 firefox.exe 112 PID 3416 wrote to memory of 1272 3416 firefox.exe 112 PID 3416 wrote to memory of 1272 3416 firefox.exe 112 PID 3416 wrote to memory of 1272 3416 firefox.exe 112 PID 3416 wrote to memory of 1272 3416 firefox.exe 112 PID 3416 wrote to memory of 1272 3416 firefox.exe 112 PID 3416 wrote to memory of 1272 3416 firefox.exe 112 PID 3416 wrote to memory of 1272 3416 firefox.exe 112 PID 3416 wrote to memory of 1272 3416 firefox.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\1010230001\SKOblik.exe"C:\Users\Admin\AppData\Local\Temp\1010230001\SKOblik.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4512 -
C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe"C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4784 -
C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe"C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe" restart5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6056 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ver6⤵
- System Location Discovery: System Language Discovery
PID:6080
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010242001\e0d67ba1a8.exe"C:\Users\Admin\AppData\Local\Temp\1010242001\e0d67ba1a8.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\1010243001\9139a13e73.exe"C:\Users\Admin\AppData\Local\Temp\1010243001\9139a13e73.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 14004⤵
- Program crash
PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010244001\6cef4e3b54.exe"C:\Users\Admin\AppData\Local\Temp\1010244001\6cef4e3b54.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
C:\Users\Admin\AppData\Local\Temp\1010245001\9464fff3b4.exe"C:\Users\Admin\AppData\Local\Temp\1010245001\9464fff3b4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\1010246001\5a589d757b.exe"C:\Users\Admin\AppData\Local\Temp\1010246001\5a589d757b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\1010247001\a25acc169a.exe"C:\Users\Admin\AppData\Local\Temp\1010247001\a25acc169a.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {14dab220-1d3a-4bf4-8633-09580ba4d768} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" gpu6⤵PID:1272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2400 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c27226d-096e-4328-8d26-84fe1e6e85fd} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" socket6⤵PID:4876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3320 -childID 1 -isForBrowser -prefsHandle 3312 -prefMapHandle 3304 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af007a2c-45d1-4b10-816f-3c588863f5fb} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" tab6⤵PID:4500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3856 -childID 2 -isForBrowser -prefsHandle 3268 -prefMapHandle 3832 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b198e5a1-e0e3-444f-8721-e31acc0be7ec} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" tab6⤵PID:2668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4564 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4604 -prefMapHandle 4596 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6c0a5d6-ad9b-4331-963d-a04c102ff5f5} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" utility6⤵
- Checks processor information in registry
PID:5336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5604 -childID 3 -isForBrowser -prefsHandle 5560 -prefMapHandle 5572 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {23df0b66-9a8e-47cb-b97c-0224928e607d} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" tab6⤵PID:4064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 4 -isForBrowser -prefsHandle 5608 -prefMapHandle 5564 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ede73216-81b9-40e5-9fc0-f9271248af56} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" tab6⤵PID:3020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5904 -childID 5 -isForBrowser -prefsHandle 5816 -prefMapHandle 5560 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {50d8a855-8302-4525-9629-323c7923348d} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" tab6⤵PID:952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010248001\795613f5ee.exe"C:\Users\Admin\AppData\Local\Temp\1010248001\795613f5ee.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4644 -ip 46441⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5557c845b4fc184f1465e42ea71a49044
SHA15845871649beba8466b42aef70e96988bf16e51b
SHA2560eb5155e264127b4f8437dabfe7f7d0200e32738a1196ce4a6e375e979ec0070
SHA512ea1ae9611ed001ebde7ed753f8a959019e17f213eabdce850cd0234dc10808ea4075aaa4e2cc5f888866bc83971fde7251fdb5b8dd61fc3f042b4eff82480783
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5359c2ff052fc018e867dcfa082f25be4
SHA1d5d48dbf4aa09954162d6260d6ad0c5c24ad7ef3
SHA256efd35bf73b55891e2dd192772251a9dcb750da9a05760a60abad27dd83c7bb72
SHA512495d117a0e63b221d1b796e99252f84364429ac83ecda02396e92b301234ad4cd7f90ea2a5b1d298a764a39f34cf063a8ace4c09cf9a90fde6f25459d03a9790
-
Filesize
149KB
MD5ab412429f1e5fb9708a8cdea07479099
SHA1eb49323be4384a0e7e36053f186b305636e82887
SHA256e32d8bbe8e6985726742b496520fa47827f3b428648fa1bc34ecffdd9bdac240
SHA512f3348dbc3b05d14482250d7c399c00533598973f8e9168b4082ee5cbb81089dfaefcfda5a6a3c9f05b4445d655051b7a5170c57ee32d7a783dc35a75fee41aa9
-
Filesize
643KB
MD527ec2b0aebea97aa3f343dea1501ec3a
SHA1c44b40baa25f257d874fee1c7b4ef9137f2ced51
SHA256589e26a16d9171ce22b9a5eb95064cc96c866b1f08ab634d714231b35c2812a8
SHA51225ac2951cb890a7747fab37ac1997e842800e71325c510122599dade0cf5bbb2cc490d87596bf8f5e9a16adc40ce1f2e19ffb0a5671597af6cb9e07ec7df9b96
-
Filesize
1.0MB
MD5273676426739b02a45a0fc9349500b65
SHA1a23c709fae04feef87358abd59504940d0d0c806
SHA256152121a5d1ac8f12002c18afc294bb1ebcecc1d61deec6211df586c11acde9b6
SHA5128945d8a68c4ebb5845fb7f6abf3b4947eb6c37812c32d4ff2f30a0472489496c4506b3be358bb350df5c3d3be11c43c19ba6d3ca72449a7122bcec73cee181d2
-
Filesize
129KB
MD590a39346e9b67f132ef133725c487ff6
SHA19cd22933f628465c863bed7895d99395acaa5d2a
SHA256e55627932120be87c7950383a75a5712b0ff2c00b8d18169195ad35bc2502fc2
SHA5120337817b9194a10b946d7381a84a2aeefd21445986afef1b9ae5a52921e598cdb0d1a576bdf8391f1ebf8be74950883a6f50ad1f61ff08678782c6b05a18adbf
-
Filesize
6.0MB
MD5905a19d6f5e9856ebf1ebae8566f840e
SHA1fe2fc3cf3af1a5b5de76793c64a32fdf95d7fb3a
SHA256d8e8ec0f6c15c1165acefd3a2b88c9bafed45e777c71d24270d672111c2b822e
SHA512bfbde612ce50082b66e23a080d436c7676c78200b4f5ecd61a68db9a56f6a3dbe8390789e2a45469e153fb449e09a17ea364dd19f8910e71634b7efa38928120
-
Filesize
5.9MB
MD5010908233328c294e5e5877e07285478
SHA118a560584c682b2dc21a1228228192c4baf47f6d
SHA256a902df81dce5a9b84929c88a5d219df0a5a07206b0801a7a723c4548609b953c
SHA5127d36f6c400271344ac91e33cac6045b3642ba59b730dd21b678bb1b9de42619766f9739bff51423f8fb4a8304fecf61f13a14987b59b098ff99062bdc795eda4
-
Filesize
1.5MB
MD59a994d678fb05bf73d7b61c76788f7eb
SHA13eb3769906efb6ff161555ebf04c78cb10d60501
SHA25684ca892ab2410acef28721d58067fcba71f0de54ede62ef2fca9aeb845b5227f
SHA512c7c846d6d8d2e43871c1c4471d26c6cfcee29a5b563eca69fef2f4e394767ef3e61a231626a1ff64aaf6a907d66a0cbe9db1c965128e3bab373e406ea891e6ce
-
Filesize
207KB
MD5045a16822822426c305ea7280270a3d6
SHA143075b6696bb2d2f298f263971d4d3e48aa4f561
SHA256318cc48cbcfaba9592956e4298886823cc5f37626c770d6dadbcd224849680c5
SHA5125a042ff0a05421fb01e0a95a8b62f3ce81f90330daed78f09c7d5d2abcb822a2fe99d00494c3ddd96226287fae51367e264b48b2831a8c080916ce18c0a675fa
-
Filesize
424KB
MD5c2a51f02511eff6edf77bc99e50ad427
SHA1a72700705c3fa64b5717ee30a4485b5299c7ac19
SHA256dcfea0126e1c02aad0ea2fb6ef93d308fa20e67d4aa812487b4a5dc57e0ff16a
SHA5121c7a0201e7b074f2dceba7e764eec261ecefd92a34741b4e152018aca41129ceb26d3a3cbe19ee7fc268820b1ff3b66e5b7e2523b076f45ad85b1d3cb11b12f0
-
Filesize
5.6MB
MD560147cda18bf6490afeeaa6635ea569c
SHA1679d9c0923c71603c15a896d3485cbf26a289291
SHA2567b668c5d6532b0e39afabc458426347c5e8f77566f608574e7d9c9a0dbccf290
SHA51231465940d267af7e712372615837971903100702fa64a43edfe4a96a0988c685ccdaf8dee9e3a6bf5655ba5329040877da15fd4f3431dce34916d6fda9334a98
-
Filesize
4.9MB
MD5a00469043467b0ed571938679ab2e796
SHA168ae694ee41f86ee9240ac8abd516c668d3b907e
SHA25683e48fb3b98f83c89a79d3d77698ae565a3f8ea09450d5a9dc5c4815d079e0fa
SHA512e8986c0c100ee8edbab67febe0a4f6fa36d716fc2397fddd0df1b86a1eafb6d85ccab8f2f48c059fd0cc9aec1119caa5e4f6c387eb23bbc9aa876bf10a3218f3
-
Filesize
2.9MB
MD5473fe371f857c6bc57bcc6e879abdce0
SHA16c9bba7026bd56ff7e01213126e82b58b6b0ab04
SHA256d13f8cafe9ae83284ff0bebaee9fa72515bf7bde2251f94879e3eac302483a5c
SHA5127ea6c95c8d6ce86fe12d348d1ff2ce664d10f4e0288c430cf353de136de9df2ec40e0a7c6772d524be523110b86abf7cbb4ecbd719f06210104091d0448b51e7
-
Filesize
1.3MB
MD52640ad05ab39321e6c9d3c71236ca0df
SHA103d30b572f312c2b554e76b3a18fbbb4a38a9be4
SHA256634d27df20591de4d9b44dfb7f1ef03284c1d120f61b0801d668c1076d72cb6d
SHA5127ea1357dcb7c22870c4993df30b00a79e61731cbea87775d800b7ff7f435858167780b22fd5af6a2df59edc1c5d5fb0e184c5f7ed4436c70ea5f91b8be4a1e75
-
Filesize
412KB
MD51396e7462eb8ce452b0f0e2540f2a0e6
SHA11a205c5a45e7fc0856db974605a1b01ad655b788
SHA25683f5e5c8adc1ab0c701ec63a33e1ff3e114583116b04d31e3e6d6a37fb61defb
SHA5122b00518d2e22d726aab3df67eaf468c49fca43d7ef2583092e04ad23b0f6085b4672fe9b1a6d80227461aafd97596e8fab176ef3f5ce2f94cda8bc3f9e6c5c04
-
Filesize
806B
MD52d707a1b8f827b5a7f54d5cfaa8e81c4
SHA1684f00ae0cf04506ae48132d9f5eb6b913df74ea
SHA256fac3409a96f95fd417f8525eba7c26486b1cc219b2fb257a9501c990743dea51
SHA5125eb6a57d6e040da3990d5e88c741df25730f5cb17cbd7c20df1ae58f7af6659891efbea93ecec499b761824ddf0d8d357fb2b3063a1d08be5f5c5dfab43dbc8b
-
Filesize
5.2MB
MD503f82642911d65bf9e055c1aef0468ef
SHA1bfa726886ad082181b0bf8b8e99cfeb28c67c09b
SHA2563c4e0d77225af8fe092d6d2ece9bfe916d99205999def1247fe4b6183224e5c8
SHA5127fc17025892ec041ac90a728f07b7a922a5e24256e9f689afb5d799f1c8d65c3a45513dc695ade4727e409d61a687fc550bd9cdd5ecc0a485d6587e261f1f86c
-
Filesize
936KB
MD58f25663fc3d70f649cecf90fec0d5b4c
SHA17f77efb66aaf465c5b4a8ecc2bfe97ac5ba74801
SHA2569ea2226c11465ca91fcda1761f3a9c0863ed47d33fc4c21df8084e59d9094e43
SHA51238551de8779871471e4d7658cd100e2b6ffe522581463cee09a7743556e5ec8737c02db01dec001d57ffe573b75dd706f92a8750633232bb7ae0d4d169424aed
-
Filesize
158KB
MD594950136ca0c9fde9d1dd02125420e42
SHA143ed4a5f1bf21202be48fae8244294824ea46815
SHA2565474e4b5b012fa630adc969e049b35623ce8373e7d095ecfc8ba2f825350bab3
SHA5126adbfe24b7e2c5596595ebf36843025b8305391154b8448cc738d358922f1d8175974120182b9fe9f3b6e190d2bc70569148466218f56e61ca8f3d49beded404
-
Filesize
21.2MB
MD5c3968e6090d03e52679657e1715ea39a
SHA12332b4bfd13b271c250a6b71f3c2a502e24d0b76
SHA2564ad1cc11410e486d132dce9716eebe6a2db0af0fcbf53ee87bc9c0af6a5aa1d4
SHA512f4908cce3e77a19bcbdc54487e025868cbd2c470b796edbf4a28aebc56cb9212019496f32eb531787de2ca9e8af0aedab2fde3d7aecee9e6a3fe3f5e4ce7670a
-
Filesize
4.2MB
MD524733346a5bbfd60cd2afd7915b0ac44
SHA196b697c75295f2d5049c2d399d740c478c40c459
SHA256f3b0734a5bf6ec2a77a02657e770842456f510980314765bef61ed367f4afc4d
SHA512e0ad7c18eff4ee66c7857caea5091f6fefb5a7cd3c5bbaf6d47d54a73e4467700c232301e828f325ec76ed36fc1628d532fab9dceaae1704e444623a8bf69d35
-
Filesize
1.9MB
MD552e5f6d44a86334dbb5c5c62036206e5
SHA1b5a808378ac6433caea7197e879f58601050c8e8
SHA256f60a518b29c845958c50ea1fb4d923362e8a6a8a8bcdb6e78610de9b6a8472b1
SHA512f32e952db2f16f17fb3df4f413402a18bcf0f625c005d16ae8e4fa09bb5fc64ae4623ecb540cd1ac3acacd934e327091b5a480394e91d2444724099d1ae99c40
-
Filesize
4.3MB
MD5c00fb21ddc79c20f5c3b03aebdfcfee5
SHA1352327cc87c1eb3c1fce7007892a7bfec519cd36
SHA2561b112a298bb3c788d5400ea056c210281e03c8a936507b7642a34ec61b5cdcdd
SHA512693064c47010edc5c8b44b81c784716de2203861aec76eeed0e0df9659fe4c74c2c19e91b5dee66e309f81ed0af97ec6458720c8d233b600b6fe96a9ebe7d966
-
Filesize
1.8MB
MD55637741a9347a75f030c8dca508dce77
SHA10085dd65c5a85d31134dc9f942c0db87c5c244d5
SHA256f112dd6e062d55b329c69dbf48c72ace210abdff50e968a7aeb825d0e9c8321a
SHA512b0b8dfb82bc6b15bb5a58fd7e3c749323779b88f0ed9d46cc924d98de3149d9af4d470cbd439807c2b01a79e5bbbe25449e63c1ad7409042896d6ebca0f88d7d
-
Filesize
1.7MB
MD582d4640b5cb22596daafe345ddfcafc4
SHA12cdb2a0a9f6fdfb0c24e418136b4aeb3b2de0048
SHA256acf37936b5d43a620c4e026e6408d17c4477cd428688de37f886385503e36d64
SHA512c0b2657cc110d8d678c7f19729128987ef9c3e83c54d56d8be9d3960d1405860f935df7379ed1e97fa89c8d53ecbd85f7c5936956791a0c492aa615a02adfad7
-
Filesize
901KB
MD55916bf407ecf55bfd9523d1725c2c13e
SHA102a9d308d5c53819f1c9ce7b255a689511bf1654
SHA256118771259988d4c0d9a07014939dd644493fbc772bdf49a020aa6dd9f9242131
SHA5127355e7d638a501f3f63547963022f2edb10b1d3442c7b449a63fd306cb082bae3bf2d2a64e14ad9e3aead6db1887450f883e263cd8f1d6aa799258de7548a773
-
Filesize
2.7MB
MD59f96f3caa7f2a02688f8d8d3e2d2023a
SHA1952d1b7f9b4d1c7e63d31138d381ea6a24addc6e
SHA2560bf7ff82e557e4b5fa165bc29ba8bdba32511f8c1b466df6cfdbe6afd0882c67
SHA5125e497dcbb631cc1b58a75feb31dcc3d681b0afb340552b1ff8ac53702aff0e844c997c5315c84400789483615032104ed4461db9917ffffb01b233e014085d6e
-
Filesize
40KB
MD5ab893875d697a3145af5eed5309bee26
SHA1c90116149196cbf74ffb453ecb3b12945372ebfa
SHA25602b1c2234680617802901a77eae606ad02e4ddb4282ccbc60061eac5b2d90bba
SHA5126b65c0a1956ce18df2d271205f53274d2905c803d059a0801bf8331ccaa28a1d4842d3585dd9c2b01502a4be6664bde2e965b15fcfec981e85eed37c595cd6bc
-
Filesize
1.8MB
MD59127be998e556e17363396d1526611b4
SHA11183f9970e1774d3e157d70225c3b7f3c92d9699
SHA256b852e881c1897d85e3ba7b89065c7ed027bcd775ec34e465b870fd5b2640b1ec
SHA51220c571bfdcb0a0b844a2266e7cdcbc5b3e13b319ad22c8ef5cf9c4930c2caac6dd12cb027324d75161d2af90b88da3b4dc09eb13a1ec2392e343df0f7ac8fd4a
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
228B
MD5719c2d69f90c30d6b39366c42153b8a6
SHA1cfb51de58a60a339e87c81a7a70e051d7120c990
SHA256b8f4c5654f7dacb031df816e4c42f5a9d3194bf892e82fd695939faeb856f4de
SHA512535a6bce469d6fb633389c0bba1e50351328eae9122c3b9b09c98ddd8608d6fd15f3a66a5d192bf3fd5580acf26c17d198350b1b21dabeb4dd77afee40685708
-
Filesize
346B
MD5b14f1dc20713e52839142fffd56f21b7
SHA1efe7e76e6a835b46d7034d143c4fea5bfaf90d6d
SHA256de160943cff9979e82bc2875627e5bb2647696f30f08fef878a7d778561134e8
SHA512f51e2492cbe0150163670777a5d0ecbe755e17b8d4d05c55db288b68e19b8a5146483aa4a9ebf4922a9897599c261cf0c5c9e896bcede78f3e8bcec2bcbef2c0
-
Filesize
364B
MD5c88e8818dde0a85db3df98d3809fd615
SHA1d13dd2ade4666b20b20f557e8849c5367d40b455
SHA25678cf40f38c501bec247cae219f76cbc458ef966040fafe42940bab4d27e6869b
SHA5125d6f855bc1a32592b68cab680b8855be51efebb8712c9e73ceaba794e39f59166ab8826f8f44ce7e1fea20a1525f93c8491a959166254796883a5b6a54482104
-
Filesize
616B
MD5d86aaa2d51b351ca4a66af3b3fb071e3
SHA10a8a80bde5bd322d93a6756f9b11a099a1ab2760
SHA256fa0f0fec83962158215ba7958dd353896740ab48ea007ab43bd322d842be1851
SHA512f866c34e039ee1c1a49456ae3de69a94f16ae6224f3db455d31c1ba637db42ed138dec7cc5bdaca3b4163000d19ff401eceb35e4a4cc762d9e924e8afc1f8b93
-
Filesize
640B
MD54d84afdb8fb2f52b7551726de00db96a
SHA193bc3dcf2d7bf600320c3616bb192a673689e573
SHA256ef92755054e398ab8f2e2d6e559ce320ae508cd3a69550af6d4ef0edd2622c72
SHA512d7b533d4a96d4d413df0e34c63f00269ed4185014a4c55ca278f0ef937651bec48573d3c416a60ff85633f6a0a3b34c6091dfe5338e7604b8632c63b53ed56f8
-
Filesize
934B
MD561a46c5eea049a9bccc1b2027310ef95
SHA193dceb2210a413e8190e2944c5dbce832e392221
SHA256a8af33465eac2beb313b335be0edc0eabe93b0ed49686a0061bba2fe882cdb19
SHA5121a8a681785864dc59656ed902971638bc9680b6988a9be4a9815eb016cdcbf73ee81c28fc6fd6b64df25d6ef36d76374ed0cf3d03c9a200b9268105b8ddc63bf
-
Filesize
1024B
MD5455605adfbeeb92369f06f5926a48d10
SHA18294efb6d147932550b8888c6492db3791740387
SHA2561d2f0e096e4e7f6e9bfcedf7629223b29824110a22b554547e822244663adef7
SHA512a975d3f9cce44ae43b3cd03472f56a20a0fc173fe8ceb6f5f127272af56b3e50ed497c3c14feed05288dc95fae8b091714a1dae49fd96e46b879761309012177
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize6KB
MD587ac44ee38976b05823ed298288bed60
SHA159a647a26be12dcc30263419fd4bf08f5c74e25a
SHA25686f78083791e6d4710afaca61a1078987e69c018e15c844924b7c3481b83a4b2
SHA512946bc68516490b5b45a2730a6826010fafc75a72e493230cbbfaf2baf7ba24e76c0d46362e578991b7458e8e3753cc8f10aa61e129f0bc788371494ba588d4fa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize8KB
MD542964599bb62ee62bc49a251c6817733
SHA130bc893d947aa297780edda09f3c6ead35e8d553
SHA256c000295459c8fcffd107a1d9574ce3f5e1fe1cae5348eafe3fce614b5da712d1
SHA5128ea6d573374bda326ba94501f5164ad232a544f3d5ec8d49ae490afdcdff9e2664c1f972fd3f065952a9baabade2fada65b0149aac19e78d62c88f23fd634c3f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD56358f1b03037ae126f990c6e441cd41d
SHA1494a5b2fb896473843169a774a33fda5f92f48cd
SHA25611f5c1285995f6172fa3b994a70f119042cdf0d9fdcadbb68548ef801db221e2
SHA51211df923c686da340723686cdc376d6e10973a552bd000a58822fc4c7f127f35e4f88ef60bf177a33c4ed241296333d9b5aae54d48dfba87d84a9ab1215ccbfd5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD588f659fdd0c14851b96a28cfe525deab
SHA15ace311e73de1d9d944721694296b8e566f7eef4
SHA256f260df054f1646b26cf074a767fcccf5c3912321a0ec7fbee2841f79f23130ea
SHA51263da8acbd69f8da0e2dc29c2ea66e213475cbeaed08acfd77045d0e69382adc8da8e1911bd554f00f1d9c34054c8307032ce08ec637958c4b70d8ab46cbc7313
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\27625674-db2b-4fe0-bb45-00bb136fb9ac
Filesize982B
MD5fbb890e2203184e198e7c1a96519f23b
SHA1580830916f06eab0ec792d45580bdea280b00b97
SHA2565b8ae6b5d4071b274f9bf571832df55b6e4b2c00719a2d16861dd5674498696c
SHA512e2c340ff5a0af6488ecc1d0c58b4f63cd1b484f6c58be14770c09bca21c0a30e9e9c53cb95bb5e55861badc0d9c6c14e3361bb8a82751493e44fc98d8b22d49f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\70bcdbdd-ac14-44cb-88b2-c64420260b76
Filesize671B
MD59b4f80760183e4aa7f964fc57b44bc97
SHA19732c3bcb2337ba59c5369b27a453bf15c6f147d
SHA2566bb556f20f33a70d59cff53ade17128d83f2e3010310c9eca03b816025636ee8
SHA5129a16cade787040e18364405e92c7f247613dfc10973ca0621bf43f6e3a90c4bb5a01e9d975121e56493c64a039bd97e6ab37e20c56c345d7358dcbdd654c50bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\9194f81b-ff1f-48e1-8bb3-643b86ca33c7
Filesize26KB
MD51cdf0f5809cc7bca68cd352fc6809adf
SHA1424bb22290cf584d4005203a3a8137c9c5ac26ce
SHA2569756f8a82b7468f6c644dbd707dce97ddc1b2b8d91700da2877857f5dd6f1af3
SHA5129f4f320abf367c5c70ff1e2717878d1f687bf066bd827f0bee97c9f3a1689759cb18f868da62aea0f3d0513ddaee8de41e3024a0dec0d92ae39c4bade965a3bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD509b3439176d11442bf0058cc460368db
SHA10f8c14b0e92956b52fb00accb62d0b52eae32a67
SHA256bf600ea74bd461ea789b3019942b443f5fdcd17c28580500db817b51988b20d5
SHA51278d6706c1eab7e71512302077e77fa910cf2ad11806a6ff7e31c358ef979b0e39bfe23a0927a068a088612ff690d280e721f5738a52548752d10224d54c8a063
-
Filesize
10KB
MD5da62f849b23b2455572826295c652ab2
SHA16cb212f55d5546e22e609e54d8173e9ac1a80f8f
SHA256ff519ed6bb13a4e9a498f42a609f611a3dc6cef4bd47d5bb9e9eb467ba46d6a9
SHA5124480d7015778290c6d7a8f602b925f51cd6746f3dc87325d698a3baddbdbbbdb01ed447899710c4591a18843892b9c4da3ffa5d26b6041baf8bd3b4264d164a3
-
Filesize
11KB
MD52d47884a600221417b9987b064f459a9
SHA1692f1e1d5cde92435154fdc2c7bdd10251065410
SHA256cf1dda68e367be3790d7276434ac1ebbc66eb59e957e123815ea7812dc54721c
SHA512509423ec7977c1285a73ffe763c7e6b4f2c7442b82a1b7aa3a6691318b2240e026123690f0f990c22f17fd5b3e9ab4d08f6883e30f754fad331358ee7640b6c7
-
Filesize
10KB
MD5ed0d00bd054fdcd93c5948cc6a3ad64e
SHA10d1b1b1238fdd824ae2e9e7ce089a89168d304ca
SHA2566bba86b56e795ed755b19be8c451f99f21426bb607d8693a64140357526ea593
SHA512a49d9c0c91b411c6ac91d253c352b08badef2f8a93164ff732593791f8b92f29b7a24467d8e9a9666f259d6965d9c5a7047b27f2bbbfa17aa0cb39bfbdb4e15a